Thursday, June 16, 2005

Wireless Best Practices

Some excellent practical suggestions on wireless from ComputerWorld---

"Stehman listed several best practices executives can follow to avoid compliance problems. Among them are making sure of the following:

  • All user devices are tested and certified by the IT staff prior to being connected to the wireless network.
  • Help desk support personnel receive hands-on training for all of the wireless devices certified by IT staffers.
  • Wireless users are briefed on how to comply with enterprise security requirements.
  • All wireless-enabled applications pass security and performance requirements prior to being deployed.
  • All wireless applications have a designated owner."
More stuff like this is needed--- there is no end of articles telling us about encryption, types of attacks, wireless protocols and technical stuff that you and I love, but to the users is just more crap in the way of doing their job.

Tuesday, June 07, 2005

Spyware FAQ

Here is a great set of FAQ's on spyware from TechTarget:

"You've seen it all on spyware – from what it is, to prevention, to remedies to quizzes. But have your spyware questions been answered? Ed Tittel answers the most frequently asked questions on spyware..."
Spyware is an increasingly prevalent problem, one that has been overshadowed in the public eye by the much more reported problems with viruses. But, truth be told, I spend more time lately dealing with spyware than with viruses. A recent infection with a new to me variation of the dreaded and pernicous CoolWebSearch wasted nearly half a day that I would have rather spent doing almost anything. Ed's FAQ mentions some remedies--- I would add the pugnaciously named Hijack This to his list.